A) Malware B) Spyware C) Spam D) Viruses
A) A term reffering to the Stone Age B) The current era characterized by the use of digital technologies C) All of the above D) A phase in the Middle Ages
A) Extremely large physical documents B) Larged-sized computer hardware C) Massive datasets that require advanced analytics D) Extremely large physical documents
A) 2005 B) 2003 C) 2000 D) 2001
A) Blogs B) Video Sharing Sites C) Wikis D) Social Networking
A) Ada Lovelace B) Grace Hopper C) John von Neumann D) Charles Babbage
A) Byron B) Mauchly C) Edison D) Babbage
A) Computer B) Analytical Engine C) Telephone D) Calculator
A) The latest version of internet browsers B) A type of computer programming language C) A network of interconnected smart devices that communicate and share data D) The internet used exclusively for gaming
A) Hacking B) Fishing C) Clicking D) Phishing
A) Excessive device durability B) Improved user control over device functionalities C) Limited data storage capabilities D) Unauthorized access to personal data
A) 5G B) Internet of Things C) Blockchain Data D) Augmented Reality
A) Slower response time in emergencies B) Limited access to medical information C) Increased paperwork and administrative tasks D) Improved patient care and treatment options
A) Limited access to movies and music B) Increased cost of entertainment C) Decreased options for entertainment D) Enabled on-demand and personalized entertainment choices
A) Instagram B) Facebook C) Tiktok D) Twitter
A) Technological Determinism B) Technological Change C) Social Constructivism D) None of the above
A) Led to economic recession B) Increased unemployment rates C) Slowed down economic growth D) Enhanced productivity and efficiency
A) Prison mayor B) Prison major C) Reclusion temporal D) Reclusion temporary
A) Virtual Reality B) Cloud Computing C) Wi-Fi Eavesdropping D) Automation
A) Through postal mail B) Through wired telephone lines C) Wirelessly through the internet D) All of these
A) Pretending to be someone else in online forums B) Stealing someone's personal information to impersonate them for fraudulent purposes C) A harmless online park D) Creating fake social media profiles
A) Malware B) Spyware C) Virus D) Worms
A) Using the same password across multiple accounts B) Using a combination of uppercase, lowercase, numbers, and symbols C) Regularly changing passwords every few years D) Using the same password across multiple accounts
A) Lack of device connectivity B) Incompatibility with modern networks C) Excessive power consumption D) Vulnerabilities in IoT device security
A) To make the message longer B) To convey emotion or tone in text-based conversation C) To show off one's technical skills D) To confuse the recipient
A) Artificial Intelligence B) Augmented Reality C) Virtual Reality D) Internet of Things
A) Increase in access to information and services that has accompanied the growth of the internet B) Can help people to communicate trough online games C) Reduced personal interaction D) Students can access teaching materials from all over the world
A) 2023 B) 2014 C) 2020 D) 2008
A) Wirelessly through the internet B) Through postal mail C) Through wired telephone lines D) Wirelessly through the internet
A) None of the above B) Technological Change C) Technological Determinism D) Social Constructivism
A) Spyware B) Trojan Horses C) Ransomware D) Spam
A) Charles Babbage B) John Mauchly C) Blaise Pascal D) Grace Hopper
A) Wi-Fi Eavesdropping B) Trojan Horses C) Viruses D) Worms
A) Communication devices B) Internet of Things C) Internet devices D) Communication of things
A) AI B) 5G C) Z1 D) ED1
A) Spamming B) Phishing C) Malware D) Pharming
A) Work from outside of the Country B) Work inside the Company C) All of the above D) Teleworking (Work from Home)
A) They are always detected and prevented by antivirus software B) They attempt to trick individuals into revealing sensitive information C) They involve physical break-ins D) They are always detected and prevented by antivirus software
A) Republic Act No. 10175 Cybercrime Prevention Act of 2013 B) Republic Act No. 10175 Cybercrime Prevention Act of 2012 C) Republic Act No. 10173 Data Privacy Act of 2012 D) Republic Act No. 10173 Data Privacy Act of 2013
A) Mark Zuckerberg B) Vinton Gray C) Timothy John Berners-Lee D) Jack Dorsey
A) Ransomware B) Spyware C) Adware D) Trojan Horse
A) Web 2.0 B) Web 1.1 C) Web 1.0 D) Web 3.0
A) Petroglyphs B) Phoenician Alphabet C) Abacus D) Papyrus Plant
A) Data transmission B) Data Communication C) Dataset D) Database
A) Limited data storage capabilities B) Unauthorized access to personal data C) Improved user control over device functionalities D) Excessive device durability
A) Smart thermostat B) Standard printer C) Basic mobile phone D) Traditional desktop computer
A) Decreased use of natural resources B) Increased pollution and waste C) Positive contribution to environmental conservation D) No impact on the environment
A) Fast downloading of files B) Securing online transactions C) Real-time data transmission of audio or video content D) Conducting online surveys
A) Virtual Reality B) Augmented Virtual C) Blockchain Data D) Augmented Reality
A) Blockchain Communication B) Blockchain Message C) Blockchain Data D) Blockchain Reality
A) 2014 B) 2023 C) 2008 D) 2020
A) Increased travel time to physical classrooms B) Limited interaction with teachers C) Decreased access to educational resources D) Improved access to a variety of learning materials
A) Wi-Fi Eavesdropping B) Automation C) Virtual Reality D) Cloud computing
A) One of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive B) Enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods C) All of the above D) Helps people live and work smarter, as well as gain complete control over their lives
A) Because of many modern technologies B) Because of the COVID-19 pandemic many business faced significant challenges and turned into online businesses C) Because of the new gadget that will be released D) All of the above
A) Hacking B) Identity theft C) Malware D) Viruses
A) Increased reliance on intuition B) All of the above C) Improved data-driven decision-making through analytics D) Decreased need for strategic planning
A) Blockchain B) Cloud computing C) Mainframe computing D) Analog computing
A) To raise awareness about potential internet threats and safe online practices B) To increase vulnerability to cyber attacks C) To promote ethical hacking practices D) To teach hacking techniques
A) Policy server B) File server C) Mailserver D) Application server
A) Only when writing formal emails B) Always, to ensure clarity and professionalism C) Never, because it's not important in the Digital world D) Only when communicating with close friends
A) Child Pornography B) Cyberbullying C) Cyber Defamation D) Cybersex
A) SSH B) IPsec C) FTP D) HTTPS
A) Penalty atleast Php 5,000 B) Penalty atleast Php 500,000 and or prison mayor C) Penalty atleast Php 200,000 and or prison mayor D) Prison mayor only
A) Internet Security Protocol B) Internet Service Provider C) Internet Search Provider D) Internet Support Program
A) None of the above B) Internet and Etiquette C) Networking and Technology D) Network and Etiquette
A) Penalty at least Php 500, 000 and or prison mayor B) Penalty of 20,000 C) Penalty of 6-12 years of imprisonment or prison mayor D) Penalty of 1 year of imprisonment or prison mayor
A) Copyright infringement B) Plagiarism C) Computer Addiction D) Piracy
A) A social media platform B) A set of rules for polite and respectful behavior on the Internet C) A social media platform D) A type of computer virus
A) Prison major B) Reclusion temporary C) Prison mayor D) Reclusion temporal
A) The sender is shouting or being rude B) The sender is emphasizing the importance of the email C) The email is spam and should be deleted D) The email contains confidential information
A) Malicious software that encrypts a victims data and demands a ransom for its release B) A software that provides free services C) A software that provides free services D) A legitimate form of remote work
A) Facebook B) eBay C) Amazon D) YouTube
A) Byte B) Bit C) Bait D) Byt
A) Educational Website B) Media Website C) Personal Website D) Nonprofit Website
A) Server B) Browser C) DNS D) IP address
A) The science of artificial intelligence B) The practice of securing computer systems and networks from cyber threats C) A type of computer game D) The study of the stock market
A) Thou shall avoid eye contact B) Thou shall be prompt C) Thou shall respect personal space D) Thou shall be prompt
A) Pinterest B) Tumbler C) Blogger D) Wordpress |